Web Application Security Master Course Training

Training Calendar

Training

Date

Training Time

Delivery Methods

Web Application Security Master ...

<h3>About Training</h3><p>As a developer, your duty is to write bulletproof code. </p><p>What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? </p><p>This advanced level course will change the way you look at code. Web Application Security Master training during which we will teach you all of the attackers’ tricks and how to mitigate them.</p><p><br></p><br /><h3>What You'll Learn</h3><ul><li>Understand basic concepts of security, IT security and secure coding</li><li>Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them</li><li>Learn about XML security</li><li>Understand Content Security Policy</li><li>Learn client-side vulnerabilities and secure coding practices</li><li>Learn about denial of service attacks and protections</li><li>Understand security concepts of Web services</li><li>Learn about JSON security</li><li>Have a practical understanding of cryptography</li><li>Understand essential security protocols</li><li>Understand some recent attacks against cryptosystems</li><li>Learn about typical coding mistakes and how to avoid them</li><li>Get information about some recent vulnerabilities in the Java framework</li><li>Understand security considerations in the SDLC</li><li>Understand security testing approaches and methodologies</li><li>Get practical knowledge in using security testing techniques and tools</li><li>Learn how to set up and operate the deployment environment securely</li><li>Get sources and further readings on secure coding practices</li></ul><br /><h3>Who Should Attend</h3><p>Web application developers, software architects and testers. </p><br /><h3>Outline</h3><ul><li>IT security and secure coding</li><li>Web application security (OWASP Top Ten 2017)</li><li>Content security policy</li><li>Client-side security</li><li>Denial of service</li><li>Practical cryptography</li><li>Security protocols</li><li>Common coding errors and vulnerabilities</li><li>Security in the software development lifecycle</li><li>Security testing</li><li>Security testing methodology</li><li>Security testing techniques and tools</li><li>Deployment environment</li><li>Principles of security and secure coding</li><li>Knowledge sources</li></ul><br />

<h3>About Training</h3><p>As a developer, your duty is to write bulletproof code. </p><p>What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? </p><p>This advanced level course will change the way you look at code. Web Application Security Master training during which we will teach you all of the attackers’ tricks and how to mitigate them.</p><p><br></p><br /><h3>What You'll Learn</h3><ul><li>Understand basic concepts of security, IT security and secure coding</li><li>Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them</li><li>Learn about XML security</li><li>Understand Content Security Policy</li><li>Learn client-side vulnerabilities and secure coding practices</li><li>Learn about denial of service attacks and protections</li><li>Understand security concepts of Web services</li><li>Learn about JSON security</li><li>Have a practical understanding of cryptography</li><li>Understand essential security protocols</li><li>Understand some recent attacks against cryptosystems</li><li>Learn about typical coding mistakes and how to avoid them</li><li>Get information about some recent vulnerabilities in the Java framework</li><li>Understand security considerations in the SDLC</li><li>Understand security testing approaches and methodologies</li><li>Get practical knowledge in using security testing techniques and tools</li><li>Learn how to set up and operate the deployment environment securely</li><li>Get sources and further readings on secure coding practices</li></ul><br /><h3>Who Should Attend</h3><p>Web application developers, software architects and testers. </p><br /><h3>Outline</h3><ul><li>IT security and secure coding</li><li>Web application security (OWASP Top Ten 2017)</li><li>Content security policy</li><li>Client-side security</li><li>Denial of service</li><li>Practical cryptography</li><li>Security protocols</li><li>Common coding errors and vulnerabilities</li><li>Security in the software development lifecycle</li><li>Security testing</li><li>Security testing methodology</li><li>Security testing techniques and tools</li><li>Deployment environment</li><li>Principles of security and secure coding</li><li>Knowledge sources</li></ul><br />

Training Details

Training Time

Capacity

Prerequisites

Documents

About Training

As a developer, your duty is to write bulletproof code.

What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code?

This advanced level course will change the way you look at code. Web Application Security Master training during which we will teach you all of the attackers’ tricks and how to mitigate them.

What You'll Learn

Understand basic concepts of security, IT security and secure coding

Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them

Learn about XML security

Understand Content Security Policy

Learn client-side vulnerabilities and secure coding practices

Learn about denial of service attacks and protections

Understand security concepts of Web services

Learn about JSON security

Have a practical understanding of cryptography

Understand essential security protocols

Understand some recent attacks against cryptosystems

Learn about typical coding mistakes and how to avoid them

Get information about some recent vulnerabilities in the Java framework

Understand security considerations in the SDLC

Understand security testing approaches and methodologies

Get practical knowledge in using security testing techniques and tools

Learn how to set up and operate the deployment environment securely

Get sources and further readings on secure coding practices

Who Should Attend

Web application developers, software architects and testers.

Outline

IT security and secure coding

Web application security (OWASP Top Ten 2017)

Content security policy

Client-side security

Denial of service

Practical cryptography

Security protocols

Common coding errors and vulnerabilities

Security in the software development lifecycle

Security testing

Security testing methodology

Security testing techniques and tools

Deployment environment

Principles of security and secure coding

Knowledge sources

You can also request this training at your institution as a private class. Please contact us:

Related Trainings

As a developer, your duty is to write bulletproof code. What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers we ...

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break ...

Telecommunication is the foundation on which critical infrastructures are built – all modern technologies heavily rely on its security. The continued adoption of IP-based telecommunication and the exposure of telecom equipment opens additional paths ...

Protecting applications that are accessible via the web requires well-prepared security professional who are at all time aware of current attack methods and trends. Plethora of technologies and environments exist that allow comfortable development of ...

Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attac ...

The past few years have seen a massive increase in attacks, data breaches and medical identity theft targeting the healthcare industry; there have also been various ransomware attacks paralyzing healthcare computer networks as well as the various med ...